General

  • Target

    7de02b69fe9275def409ee590e2e9e6260105a9f039f6323d6436f2ac8d7352b

  • Size

    1.1MB

  • Sample

    240217-bec3eahe5t

  • MD5

    4bdee3d2933afecf715d363b355bcbeb

  • SHA1

    49cff68323a7e54867887cb14f75cfe459dcb89b

  • SHA256

    7de02b69fe9275def409ee590e2e9e6260105a9f039f6323d6436f2ac8d7352b

  • SHA512

    aade86e9109b6efdd82dc355a913a00fda355dfea0afd5cb87b1d99a0a5990afdf9653d53f29a425236a284e5eb19058b7702916653fef2751a45d0be8b8addb

  • SSDEEP

    12288:rgeMBID71CWeVdxB5uRaWmk93sYvBFaXQAT2QEhXbwhjKU+oGnmAudhgIQnGy:rgeMBID78l4aW+4iRTCbwhjKTxnmAA

Malware Config

Targets

    • Target

      7de02b69fe9275def409ee590e2e9e6260105a9f039f6323d6436f2ac8d7352b

    • Size

      1.1MB

    • MD5

      4bdee3d2933afecf715d363b355bcbeb

    • SHA1

      49cff68323a7e54867887cb14f75cfe459dcb89b

    • SHA256

      7de02b69fe9275def409ee590e2e9e6260105a9f039f6323d6436f2ac8d7352b

    • SHA512

      aade86e9109b6efdd82dc355a913a00fda355dfea0afd5cb87b1d99a0a5990afdf9653d53f29a425236a284e5eb19058b7702916653fef2751a45d0be8b8addb

    • SSDEEP

      12288:rgeMBID71CWeVdxB5uRaWmk93sYvBFaXQAT2QEhXbwhjKU+oGnmAudhgIQnGy:rgeMBID78l4aW+4iRTCbwhjKTxnmAA

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks